An Effective Countermeasure Against UAV Swarm Attack

被引:17
|
作者
He, Daojing [1 ]
Yang, Guang [1 ]
Li, Hongyi [1 ]
Chan, Sammy [2 ]
Cheng, Yao [3 ]
Guizani, Nadra [4 ]
机构
[1] East China Normal Univ, Sch Software Engn, Shanghai, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[3] Inst Infocomm Res, Singapore, Singapore
[4] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
来源
IEEE NETWORK | 2021年 / 35卷 / 01期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Unmanned aerial vehicles; Interference; Global Positioning System; Missiles; Gyroscopes;
D O I
10.1109/MNET.011.2000380
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
UAV (Unmanned Aerial Vehicle) swarms are being utilized to launch military attacks due to its technological development. At present, there is a lack of countermeasures against such attacks. In this article, we propose to use GPS spoofing to deceive the UAV swarms location sensing system as a countermeasure. Based on two open-source tools, ROS and Gazebo, we build a simulation platform of the UAV swarm position perception, and design experiments to deceive the UAV swarms location sensing system. Experimental results show that two UAVs in flight can be maneuvered to collide through GPS spoofing, which can be a potential defense approach against attacks using UAV swarms.
引用
收藏
页码:380 / 385
页数:6
相关论文
共 50 条
  • [1] Countermeasure against the Jacobi symbol attack
    Computational Science Graduate Program, Universidad Nacional Aut´onoma de &#7742exico, Campus Cuautitĺan, Av. 1 de Mayo s/n, Col. Atlanta. 54740 Cuautitĺan Izcalli, United States
    WSEAS Trans. Comput., 12 (407-416):
  • [2] A Countermeasure against Relay Attack in NFC Payment
    Li, Peng
    Fang, Huayi
    Liu, Xiang
    Yang, Baijian
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [3] Countermeasure of TWINE against Power Analysis Attack
    Nozaki, Yusuke
    Asahi, Kensaku
    Yoshikawa, Masaya
    2015 IEEE INTERNATIONAL MEETING FOR FUTURE OF ELECTRON DEVICES, KANSAI (IMFEDK), 2015,
  • [4] Swarm UAV Attack: How to Protect Sensitive Data?
    Erra, Robert
    Guyot, Vincent
    Avanthey, Loica
    Gademer, Antoine
    Beaudoin, Laurent
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 296 - 300
  • [5] A PRACTICABLE TIMING ATTACK AGAINST HQC AND ITS COUNTERMEASURE
    Wafo-Tapa, Guillaume
    Bettaieb, Slim
    Bidoux, Loic
    Gaborit, Philippe
    Marcatel, Etienne
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2022, 16 (03) : 621 - 642
  • [6] Countermeasure against the SPA Attack on an Embedded McEliece Cryptosystem
    Petrvalsky, Martin
    Richmond, Tania
    Drutarovsky, Milos
    Cayrel, Pierre-Louis
    Fischer, Viktor
    2015 25TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA), 2015, : 462 - 466
  • [7] The Small and Silent Force Multiplier: A Swarm UAV—Electronic Attack
    Polat Cevik
    Ibrahim Kocaman
    Abdullah S. Akgul
    Barbaros Akca
    Journal of Intelligent & Robotic Systems, 2013, 70 : 595 - 608
  • [8] Manipulative Attack Against Physical Layer Key Agreement and Countermeasure
    Jin, Rong
    Zeng, Kai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 475 - 489
  • [9] Function Masking: A New Countermeasure Against Side Channel Attack
    Kim, Taesung
    Ahn, Sungjun
    Lee, Seungkwang
    Choi, Dooho
    INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 331 - 342
  • [10] An Efficient Hardware Countermeasure against Differential Power Analysis Attack
    Choudhury, Amlan Jyoti
    Park, Beum Su
    Bruce, Ndibanje
    Lee, Young Sil
    Lim, Hyotaek
    Lee, Hoon Jae
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 153 - +